Sciweavers

464 search results - page 8 / 93
» Identity Management for Self-Portrayal
Sort
View
ACISP
2005
Springer
14 years 27 days ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
CHIMIT
2009
ACM
14 years 1 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
SACMAT
2011
ACM
12 years 10 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
14 years 1 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
HICSS
2002
IEEE
95views Biometrics» more  HICSS 2002»
14 years 9 days ago
Social Scientists: Managing Identity in Socio-technical Networks
Since the advent of the world-wide web, academic researchers have constructed web pages to present a view of themselves, their work, their associations and their interests. This n...
Roberta Lamb, Elizabeth Davidson